June 14, 2016 Carberp/Zeus Malware Mashup Spawns Sophisticated Bolek Banking Trojan 2 min read - Malware-makers have taken key parts of Carberp and Zeus to spawn the Bolek banking Trojan, which aims to steal confidential user information.
June 13, 2016 Necurs Botnet Stumbles, Dridex and Locky Feel It 2 min read - Security researchers noticed a suspicious shutdown of the Necurs botnet, which is causing some disruption in Dridex and Locky campaigns.
June 13, 2016 Crysis Ransomware Prompts Panic as New Strain Supplants TeslaCrypt, Dethrones Locky 2 min read - Crysis ransomware snuck up on security researchers to become one of the most popular threats attacking organizations with old-school techniques.
June 7, 2016 Cerber Ransomware Uses Fast-Changing Hash Signatures to Evade Detection 2 min read - Researchers recently discovered that the Cerber ransomware is generating new hashes every 15 seconds to avoid detection by security tools.
Banking & Finance June 7, 2016 Is Mobile Banking Safe? 4 min read - Mobile banking is becoming more popular, but as it grows the risks become bigger as well. Are financial institutions protecting their customers?
June 7, 2016 Need for Speed: FastPOS Chooses Swift, Tosses Subtle 2 min read - FastPOS is a point-of-sale malware that favors speed of subtlety — and it could be the next big threat to small or understaffed organizations.
June 6, 2016 New ICS Malware Irongate Channels Stuxnet to Scam SCADA Systems 2 min read - A newly discovered ICS malware called Irongate is eerily similar to the Stuxnet worm in the way it goes after SCADA and industrial control systems.
June 1, 2016 No Wriggle Room? ZCryptor Ransomware Worms Its Way Onto PCs 2 min read - A new malware called ZCryptor was recently found to be leveraging attack techniques that resemble worms, making it the first case of a ransomworm.
May 30, 2016 Sandjacking: New iOS Threat Lets Attackers Out of the Box 2 min read - A newly discovered iOS threat called sandjacking could affect any user or app if cybercriminals gain physical access to a mobile device.
May 26, 2016 Pastejacking: The Clipboard Copy Concern? 2 min read - A new exploit called pastejacking results in victims unwittingly infecting their own machines thanks to malicious code hidden in seemingly normal text.